You are previewing Violent Python.
O'Reilly logo
Violent Python

Book Description

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.



- Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.

- Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices.

- Data-mine popular social media websites and evade modern anti-virus.

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Trade marks
  6. Acknowledgements
  7. Dedication
  8. Lead Author – TJ O’Connor
  9. Contributing Author Bio – Rob Frost
  10. Technical Editor Bio – Mark Baggett
  11. Introduction
    1. TARGET AUDIENCE
    2. ORGANIZATION OF THE BOOK
    3. COMPANION WEB SITE
  12. Chapter 1. Introduction
    1. Introduction: A Penetration Test with Python
    2. Setting Up Your Development Environment
    3. The Python Language
    4. Your First Python Programs
    5. Chapter Wrap-Up
    6. References
  13. Chapter 2. Penetration Testing with Python
    1. Introduction: The Morris Worm—Would it Work Today?
    2. Building a Port Scanner
    3. Building an SSH BotNet with Python
    4. Mass Compromise by Bridging FTP and Web
    5. Conficker, Why Trying Hard is Always Good Enough
    6. Writing Your Own Zero-Day Proof of Concept Code
    7. Chapter Wrap Up
    8. References
  14. Chapter 3. Forensic Investigations with Python
    1. Introduction: How Forensics Solved the BTK Murders
    2. Where Have You Been?—Analysis of Wireless Access Points in the Registry
    3. Using Python to Recover Deleted Items in the Recycle Bin
    4. Metadata
    5. Investigating Application Artifacts with Python
    6. Investigating iTunes Mobile Backups with Python
    7. Chapter Wrap-Up
    8. References
  15. Chapter 4. Network Traffic Analysis with Python
    1. Introduction: Operation Aurora and How the Obvious was Missed
    2. Where is that IP Traffic Headed?—A Python Answer
    3. Is Anonymous Really Anonymous? Analyzing LOIC Traffic
    4. How H D Moore Solved the Pentagon’s Dilemma
    5. Storm’s Fast-Flux and Conficker’s Domain-Flux
    6. Kevin Mitnick and TCP Sequence Prediction
    7. Foiling Intrusion Detection Systems with Scapy
    8. Chapter Wrap Up
    9. References
  16. Chapter 5. Wireless Mayhem with Python
    1. Introduction: Wireless (IN)Security and the Iceman
    2. Setting up Your Wireless Attack Environment
    3. The Wall of Sheep—Passively Listening to Wireless Secrets
    4. Where Has Your Laptop Been? Python Answers
    5. Intercepting and Spying on UAVs with Python
    6. Detecting FireSheep
    7. Stalking with Bluetooth and Python
    8. Chapter Wrap Up
    9. References
  17. Chapter 6. Web Recon with Python
    1. Introduction: Social Engineering Today
    2. Using the Mechanize Library to Browse the Internet
    3. Scraping Web Pages with AnonBrowser
    4. Research, Investigate, Discovery
    5. Anonymous Email
    6. Mass Social Engineering
    7. Chapter Wrap-Up
    8. References
  18. Chapter 7. Antivirus Evasion with Python
    1. Introduction: Flame On!
    2. Evading Antivirus Programs
    3. Verifying Evasion
    4. Wrap Up
    5. References
  19. Index